Combating Spyware in the Enterprise (eBook)
448 Seiten
Elsevier Science (Verlag)
978-0-08-050222-9 (ISBN)
Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate, web filtering, using FireFox, MacOSX, or Linux, patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
* A recent survey published by Information Security Magazine stated that combating spyare was the #2 priority for security professionals in 2005
* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.* A recent survey published by Information Security Magazine stated that "e;combating spyare"e; was the #2 priority for security professionals in 2005* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors
Front Cover 1
Combating Spyware in the Enterprise 4
Copyright Page 5
Contents 14
Chapter 1. An Overview of Spyware 22
Introduction 23
Spyware: Defined 23
Malware: Defined 28
Adware: Defined 30
Parasiteware: Defined 32
Phishing: Defined 33
Botnets: Defined 39
Summary 42
Solutions Fast Track 42
Frequently Asked Questions 45
Chapter 2. The Transformation of Spyware 48
Introduction 49
The Humble Beginnings 49
Spyware in the Twenty-First Century 60
The Future of Spyware 64
Summary 66
Solutions Fast Track 66
Frequently Asked Questions 68
Chapter 3. Spyware and the Enterprise Network 70
Introduction 71
Keystroke Loggers 72
Trojan Encapsulation 83
Spyware and Backdoors 89
Summary 96
Solutions Fast Track 96
Frequently Asked Questions 98
Chapter 4. Real Spyware—Crime, Economic Espionage, and Espionage 100
Introduction 101
White to Gray to Black— Increasing Criminal Use of Spyware 102
It's All in the Delivery 109
Phishing Detection 121
Reporting Phishing 129
Bot Detection 137
Reporting Botnets 146
Summary 152
Solutions Fast Track 156
Frequently Asked Questions 162
Chapter 5. Solutions for the End User 164
Introduction 165
Freeware Solutions 165
Toolbar Solutions 200
Licensed Solutions 206
Summary 216
Solutions Fast Track 218
Frequently Asked Questions 219
Chapter 6. Forensic Detection and Removal 222
Introduction 223
Manual Detection Techniques 223
Detection and Removal Tools 244
Summary 279
Solutions Fast Track 281
Frequently Asked Questions 283
Chapter 7. Dealing with Spyware in a Non-Microsoft World 286
Introduction 287
Spyware and Linux 287
Spyware and the Macintosh 295
Summary 303
Solutions Fast Track 304
Frequently Asked Questions 305
Chapter 8. The Frugal Engineer's Guide to Spyware Prevention 308
Introduction 309
Locking Down Internet Explorer 309
Developing a Security Update Strategy 322
Securing E-mail 334
Securing Windows 339
Summary 350
Solutions Fast Track 351
Frequently Asked Questions 353
Appendix A: Malware, Money Movers, and Ma Bell Mayhem! 356
Introduction 357
Mule Driving and Money Laundering 357
Phishers Phone Home 363
Slithering Scalability 374
The Phuture of Phishing 391
Summary 392
Solutions Fast Track 392
Frequently Asked Questions 394
Index 396
Erscheint lt. Verlag | 4.8.2006 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management | |
ISBN-10 | 0-08-050222-9 / 0080502229 |
ISBN-13 | 978-0-08-050222-9 / 9780080502229 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich